Susan Morrow, Author at Security Boulevard

Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy

| | General Security
Introduction  I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their craft seriously. They treat cybercrime as a business, looking for ways to maximize profit while seeking innovative methods to circumvent our efforts to protect our businesses ... Read More

Brand impersonation attacks targeting SMB organizations

| | Security Awareness
Introduction Building and maintaining a brand is an important part of a successful business. Having a recognized brand confers recognition, and if done well, provides a way of developing trust between customers and company. Brand trust and loyalty go hand-in-hand. Research has shown that 80% of US customers look at ... Read More
Average CCNA salary 2020

Average CCNA salary 2020

| | CCNA, feature, FEATURED, networking, salary
Introduction The CCNA (Cisco Certified Network Associate) is one of the most well-known entry-level certifications within the IT industry. Holding this credential proves your ability to install,... Go on to the site to read the full article ... Read More

Average CCNP salary 2020

| | IT Certifications, networking
Introduction The CCNP, or Cisco Certified Network Professional, is a certification endorsing IT professionals who have the knowhow and skill to set up, configure and manage local and wide-area... Go on to the site to read the full article ... Read More

8 of the world’s biggest insider threat security incidents

| | Security Awareness
Introduction If you work in security or are just interested in the general area of cybersecurity you will no doubt have heard of the dreaded insider threat. In the context of cybersecurity threats,... Go on to the site to read the full article ... Read More

Security theatrics or strategy? Optimizing security budget efficiency and effectiveness

| | Security Awareness
Introduction I am a staunch advocate of the consideration of human behavior in cybersecurity threat mitigation. The discipline of behavioral ecology is a good place to start. This subset of... Go on to the site to read the full article ... Read More

NY SHIELD Act: Security awareness and training requirements for New York businesses

| | Security Compliance
Introduction The world of data protection and privacy regulations has brought us many laws and acts. The most commonly cited are the EU’s General Data Protection Regulation (GDPR) and the California... Go on to the site to read the full article ... Read More

Ultimate guide to international data protection and privacy laws

| | Security Awareness
Introduction  Human beings have many things in common and we all live in one world, together. However, when it comes to data privacy laws, the saying “there are many ways to skin a cat” seems apt. ... Go on to the site to read the full article ... Read More

SIM swapping security risks: What they are and how to protect yourself

| | Security Awareness
Introduction The joke that someone needs to have a mobile phone “surgically removed” is not too far from the mark. Mobile phones have become ubiquitous and intrinsically linked to our digital... Go on to the site to read the full article ... Read More

Are apps stealing company secrets? Smart device privacy concerns for businesses

| | Security Awareness
Introduction Privacy often feels like it is something that can be bought, sold and/or simply ignored. So many people use the old and worn argument: “If you have nothing to hide, why worry about... Go on to the site to read the full article ... Read More